multihop energy efficient reliable and fault tolerant routing

15
International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 2, February 2013) 395 Multihop Energy Efficient Reliable and Fault Tolerant Routing Protocol for Wireless Sensor Networks K. Vinoth Kumar 1 , S.Karthikeyan 2 1 Assistant Professor, M.A.R College of Engg&Tech, Viralimalai, Tamil Nadu. 2 PG Scholar, Karpagam University, Coimbatore, Tamil Nadu. Abstract--The work in this paper aims at designing a multihop energy efficient, reliable and fault tolerant routing protocol. It proposes to maintain an asymmetric network of sensors so that the nodes get a chance to configure their transmission ranges best, and thus delivers data to the base station using as little energy as possible. Our protocol design concentrates on the load sharing feature by maintaining multiple routes and selecting the best one for relaying the data packets. It assigns different transmission powers to different nodes based on the network topology. The problem of bottleneck around the base station is addressed by varying the transmission ranges of the nodes periodically, which changes the topology, to balance the responsibility among the nodes across the network. Index Termsmultihop energy efficient, reliable and fault tolerant routing, multiple routes, bottleneck. I. INTRODUCTION The work reported in this thesis aims at designing of a multihop energy efficient, reliable and fault-tolerant routing protocol. In a fully connected network, all nodes can directly access the base station. However, wireless being a broadcast medium, the congestion [1] in such a network is very high. Typically, each node in a multihop WSN would discover a path to the base station and route its data through this path. This causes the nodes near the base station to be used more frequently than the nodes away from the base station. The reason is the former set of nodes not only send their own sensed data, but are also responsible for forwarding the packets from the far off nodes in the network. This results in a bottleneck around the base station. If the nodes around the base station go dead, then the nodes away from base station will be unable to send the data unless they increase their transmission ranges. Figure Fig 1 shows an example of a typical sensor network. The filled black node is the base station. The lines depict the connectivity and the filled gray nodes are the normal sensing nodes. In this example node-2 and node-3 are one hop nodes. Node-2 is responsible not only for sending its own data but also for forwarding the data from nodes-4, 5, 6, 9 and 10. Similarly, node-3 is responsible for sending its own data and as well as forwarding data of nodes-7, 8, 11 and 12. Thus the nodes situated at a distance of one hop from base station are used more often than the other nodes. It causes such nodes to dissipate energy at a substantially higher rate than the rest of the nodes in the network [3]. Consequently, the network becomes dead very soon. The residual energy in the nodes near the base station may be sufficient to sense, but may not be sufficient communicate the sensed data to the base station. This observation led us to think how a routing protocol may avoid the formation of transmission bottleneck around the base station. Fig-1. Example of a typical sensor network The underlying idea is to ensure that the energy dissipation at each node is more or less same over the entire network. The approach we devised is to adjust transmission range of individual nodes to provide connectivity of base station without involving the nodes near the base station as and when desired. It led to dynamicity in the sensor network environment.

Upload: others

Post on 03-Feb-2022

3 views

Category:

Documents


0 download

TRANSCRIPT

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 2, February 2013)

395

Multihop Energy Efficient Reliable and Fault Tolerant

Routing Protocol for Wireless

Sensor Networks K. Vinoth Kumar

1, S.Karthikeyan

2

1Assistant Professor, M.A.R College of Engg&Tech, Viralimalai, Tamil Nadu. 2PG Scholar, Karpagam University, Coimbatore, Tamil Nadu.

Abstract--The work in this paper aims at designing

a multihop energy efficient, reliable and fault

tolerant routing protocol. It proposes to maintain an

asymmetric network of sensors so that the nodes get a

chance to configure their transmission ranges best,

and thus delivers data to the base station using as

little energy as possible. Our protocol design

concentrates on the load sharing feature by

maintaining multiple routes and selecting the best one

for relaying the data packets. It assigns different

transmission powers to different nodes based on the

network topology. The problem of bottleneck around

the base station is addressed by varying the

transmission ranges of the nodes periodically, which

changes the topology, to balance the responsibility

among the nodes across the network.

Index Terms— multihop energy efficient, reliable

and fault tolerant routing, multiple routes,

bottleneck.

I. INTRODUCTION

The work reported in this thesis aims at designing

of a multihop energy efficient, reliable and fault-tolerant

routing protocol. In a fully connected network, all nodes

can directly access the base station. However, wireless

being a broadcast medium, the congestion [1] in such a

network is very high. Typically, each node in a multihop

WSN would discover a path to the base station and route

its data through this path. This causes the nodes near the

base station to be used more frequently than the nodes

away from the base station. The reason is the former set

of nodes not only send their own sensed data, but are

also responsible for forwarding the packets from the far

off nodes in the network. This results in a bottleneck

around the base station. If the nodes around the base

station go dead, then the nodes away from base station

will be unable to send the data unless they increase their

transmission ranges. Figure Fig 1 shows an example of a

typical sensor network. The filled black node is the base

station. The lines depict the connectivity and the filled

gray nodes are the normal sensing nodes.

In this example node-2 and node-3 are one hop

nodes. Node-2 is responsible not only for sending its

own data but also for forwarding the data from nodes-4,

5, 6, 9 and 10. Similarly, node-3 is responsible for

sending its own data and as well as forwarding data of

nodes-7, 8, 11 and 12.

Thus the nodes situated at a distance of one hop from

base station are used more often than the other nodes. It

causes such nodes to dissipate energy at a substantially

higher rate than the rest of the nodes in the network [3].

Consequently, the network becomes dead very soon. The

residual energy in the nodes near the base station may be

sufficient to sense, but may not be sufficient

communicate the sensed data to the base station. This

observation led us to think how a routing protocol may

avoid the formation of transmission bottleneck around

the base station.

Fig-1. Example of a typical sensor network

The underlying idea is to ensure that the energy

dissipation at each node is more or less same over the

entire network. The approach we devised is to adjust

transmission range of individual nodes to provide

connectivity of base station without involving the nodes

near the base station as and when desired. It led to

dynamicity in the sensor network environment.

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 2, February 2013)

396

We can view the dynamicity as insertion of new

nodes and deletion of nodes (node failure) at random

time. Our second observation is that WSNs experience

high packet losses. So, reliability is also important for

WSN [2]. Transmission reliability can be achieved

through an acknowledgment based protocol. It helps in

deciding the requirement of retransmissions if the packet

loss occurs and thus increases the reliability. An usual

trend in protocol design suggests that the location

parameters play crucial role for the routing purposes.

The determination of position parameters requires use of

embedded GPS receivers. But with embedded GPS

receivers will make the sensor nodes substantially

expensive. Additionally, also the nodes will consume

more power. Therefore, our aim is also to ensure come

up with routing protocols which avoids use of location

based information.

1.1. Problem statement and the Challenges Involved

The investigation in this paper is oriented towards

the design a multi hop routing protocol for time driven

WSN which achieves following objectives.

Avoid the formation of the congestion bottleneck

around the base station

Handle dynamic changes in topology caused by

transmission power adjustments.

Handle node failures on existing paths by a novel

route repair procedure that leverages ability to

adjust node transmission range.

Ensure reliability through use of

acknowledgements and limited retransmission of

lost packets.

Improve the network lifetime by considering

residual node energy during route discovery.

Analyze and compare the new protocol with the

existing ones.

The objectives listed at items 1 and 5 are achieved by

better utilization of the resources and treating the

network as a dynamically changing asymmetric network.

The topology change in the network is mainly

determined by adjustment of transmission range from

time to time. The resulting change topology modifies

path from every node to base station. The routing

protocol is, therefore, is a mix of both proactive and

reactive protocol [4]. The tasks of route discovery and

route maintenance become more challenging in an

asymmetric network, as Hello messages can not be used

for such purposes in asymmetric links. The latency of

route discovery also has to be minimized. Balancing

distribution of load for routing (forwarding packets)

among the nodes shall ensure the uniform and better

resource utilization. The concept of asymmetric network

shall allow the nodes to use appropriate transmission

ranges, which is more suitable for its longer lifetime

depending on its position in the network.

The fault tolerance in routing protocols for WSN is a

novel idea. It has been possible to tolerate node failure

simply by eliminating failed nodes through a route

maintenance step. It involves the adjustment of

transmission power at some nodes for establishing

connectivity with the base station when the routes are

found to be broken due to node failures. We

experimented with up to 5% node failures [5] [6] . The

objective concerning reliability in transmission is

achieved by acknowledgments for the data packets. The

protocol supports at most three retransmissions of the

data packets to handle packet loss. The routing metric is

chosen by optimizing both latency of routes and residual

energies at the nodes. The other desirable property of a

protocol which is addressed is load sharing. The load for

routing data packets is distributed over the multiple

alternate paths available at a node. It ensures overall

better utilization of energy resources and effectively

extends lifetime of the network.

Finally, we performed simulation over OMNet++

261] and compared our results with other notable time

driven WSN routing protocols such as LEACH [14] and

SPIN [13]. Our results show performance enhancement

over symmetric routing protocols and over both SPIN

and LEACH even without data aggregation

II. RELATED WORKS

This chapter deals with related work and the

underlying concepts which form the basis of energy

aware routing protocols for WSN Section 2.1 explains

how simple routing ideas could lead to unnecessary

wastage of precious energy resources. Section 2.2 deals

with some initial thinking done by researchers on the

ways to avoid broadcast storm which appear to be the

main reason behind excessive energy wastage in

routings ideas based on flooding and gossiping. Section

2.3 describes a number of routing protocols, namely,

LEACH [14], PEGASIS [15] TEEN [17] and APTEEN

[16] which try to eliminate redundant data broadcast and

conserve the crucial energy resource by aggregation in

some way or other. Later, section 2.4 which are relevant

in context to this paper. The subject of discussion in

section 2.5 is the quality and reliability of data delivered

by the sensors.

2.1 Flooding and Gossiping

The conventional mechanism for relaying data from

individual sensors to base station is Flooding or

Gossiping. The underlying idea of flooding is that each

sensor on receiving a data packet broadcasts the same to

its every neighbor. This packet is further re-broadcast

until it arrives at the destination or the maximum

number of hops for the packet is reached. Quite

obviously, flooding raises unmanageable broadcast

storms as depicted in Fig 2.1.

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 2, February 2013)

397

Fig- 2.1: Broadcast storm

It may be appropriate for networks which experience

quick topology changes. WSN mainly consists of static

sensors nodes. So, topology remains more or less static

for a considerable period of time. Of course, it is possible

to control topology by adjusting transmission power of

sensor motes. But such power adjustments can only be

realized by program controls and hence, predictable. The

other serious problems with broadcast storm are

redundancies, contentions and collisions which result in

wasteful consumption of node energies. Since sensor

nodes have only limited energy reserves in the from of

small batteries, they can ill-afford such associated

problems arising out of broadcast storms [9]. Therefore,

flooding does not seem to be an appropriate approach of

design of routing protocols in WSNs. The deficiencies of

data reporting by flooding can be viewed under three

categories namely,

Implosion: it refers to nodes disseminating data

to all

of their neighbors regardless of whether the data

has already been received by these neighbors. It

result in wastage of energy across several nodes,

since the same piece of data arrives at every node

via multiple paths.

Overlap: it is not possible to have a precise

deployment whereby sensor could cover disjoint

spatial regions. So nodes often have overlapping

spatial coverage. Data dissemination by flooding,

therefore, results in data from overlapping regions

to be routed by different alternative sensors and

flooded over the network.

Resource ignorance: flooding does not require the

threshold. Consequently, a node may run out of

energy too soon to perform any meaningful data

sensing or reporting.

Gossiping is just a slightly enhanced version of

flooding wherein the recipient node sends the data

packet to a randomly selected neighbor [12]. That

neighbor in turn picks another random neighbor to

forward the packet to and so on. Another usual variation

of gossip protocol is that the recipients could

rebroadcasts or discard the data with probabilities p and

(1-p) respectively. By controlling the fraction of

executions where gossip die out relatively low and

keeping the gossip probability low it is possible to save

up to 35% message overhead compared to flooding [9].

But gossip based protocol exhibit bimodal behavior in

the sense that in almost all executions either most of the

nodes receive a message or hardly any of them do.

Furthermore, in many applications gossip delay may be

unacceptable.

2.2 SPIN and Directed Diffusion

The focus Sensor Protocols for Information via

Negotiation (SPIN) was to work around the problems of

simple flood based protocol mentioned in the previous

section. SPIN was successful in addressing all the

problems existing in the flood based protocols. It labeled

the data with the high level data descriptors, called

metadata. The metadata was used to negotiate between

the nodes, eliminating the redundant data from being

transmitted to the nodes [8] 11] . As the metadata was

supposed to be the compressed form of the original data

so, the network congestion could be avoided. So, the

SPIN mainly comprises of three phases.

STEP 1: Advertisement of the metadata

STEP 2: Request for the data

STEP 3: Actual data transmission.

There is also an energy efficient version of the SPIN in

which a node enters into this three way handshake only

if it has sufficient energy to complete it till the end.

SPIN not only achieved a considerable improvement

over flooding, but also instrumental to open up the

existing gaps in the research on routing protocols. It is

observed that the data actually traverses along multiple

paths but gets finally accepted from just one path, and

discarded from remaining others[13]. SPIN’s

implementation did not talk about the reliability which

may be one of the important issues in reliability

considering that the wireless networks are highly error-

prone. Fig 2.2 depicts the stepwise process.

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 2, February 2013)

398

Fig-2.2. SPIN

Subsequently, a new protocol called Directed

Diffusion was proposed for event driven applications.

Directed diffusion concentrated on reducing the number

of multiple paths along which data traverses. It also

incorporates some novel features - data-centric

dissemination, reinforcement based adaptation to the

best path, in-network data aggregation, and caching. A

central controller called Sink injects its interest in the

network by normal flooding with a large update

interval. Sensors report data if they match with the

interest received from the sink node. A sensor sends to

the interested node through multiple paths. The

neighboring node establishes a gradient towards each

other based on the direction from which they have

received interest[7] [10]. This way the interested data

finds its path to the sink. Apart from being unsuitable

for continuous data delivery, it incurs extra overhead for

data matching and interest injection.

2.3 Aggregation Protocols

Considering that the sensors are resource constraint,

and the existing inherent redundancies which

characterizes data reporting in SPIN as well as directed

diffusion, a lot of scope for improvements were there.

LEACH is another protocol in line to throw some light

on the same issues and propose some more

improvements. The basic idea employed in LEACH is

cut down the overhead by reduce volume of data

reportage. LEACH[14] is an energy efficient,

aggregation protocol. It includes cluster formation and

local processing to reduce global communication by

collecting the packets of all the nodes in the cluster in

one place and aggregating the information contained.

The randomized rotation of the cluster-heads helps in

implementing the load sharing property. The LEACH

protocol involves the following steps:

STEP 1: Status collection of all nodes by the base

station.

STEP 2: Selection of the cluster heads by the base

station.

STEP 3: Choosing of the best cluster head by the node

STEP 4: Data dissemination to the cluster head

STEP 5: Aggregated data dissemination to the base

station by the cluster heads.

The problem with LEACH is that it considers all the

nodes to have accessibility to the base station when it

becomes the cluster head or when sending the status

message to the base station. According to the MICAz

specifications, the maximum outdoor transmission range

which is allowed for a node is 100m. The indoor

transmission range is even less, it is 30m at the

maximum. That means, to provide one hop connectivity

the maximum distance of a node from the base station

can be at most 100m. If the base station is placed at edge

of the network area then the maximum area which can

be allowed in LEACH. In LEACH each node decides its

cluster head based on which of the heads is closest to it.

It means that the location parameter plays an important

role here. The nodes need to know the position

coordinates of all the cluster heads chosen for that

round. LEACH needs GPS enabled node, which requires

considerable amount of energy apart from making the

sensor motes quite expensive.

The original LEACH proposal provisions for 5% of the

total nodes to be selected as the cluster head. With 100

nodes, the number of clusters formed will be 5. Given

that the maximum area which can be covered is 785m2.

Therefore, even after using so many nodes in such a

small area, the actual data transferred to the base station

is not much. If the volume of data to be transferred to the

control-center is considerable then either the number of

nodes must be increased or the percentage of the total

nodes selected as the cluster heads should be increased.

The energy dissipation at nodes is proportional to the

square of the distance from the destination, therefore,

the node which dies first is always the farthest nodes.

LEACH is not an acknowledgement based protocol. So,

the nodes receive no information of data being lost or

corrupted on the way to the destination. The protocol,

therefore, lacks reliability. The wireless networks are full

of noisy interferences and LEACH does allow any

redundancy in data, as the aggregation removes

redundancy, so non-reliable nature can be considered as

one of the major drawbacks.

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 2, February 2013)

399

Although the LEACH does not talks directly about

asymmetric links, nor does introduce the concept, it is

implicit from the explanation that the nodes adjust their

transmission range every time they need to

communicate, based on their distance from the node

with which they want to communicate[19] [20]. In a

sense, the network can be considered to be asymmetric.

The asymmetric nature of the network here does help in

avoiding the wastage of energy and congestion, but as

the protocol is not implemented in a distributed way, the

asymmetric characteristic is under emphasized. Rather it

is considered a network with nodes having adjustable

transmission range. Environmental energy harvesting

has also been considered for improving the sustainable

lifetime of the resource constraint network. Numerous

harvesting modalities have been suggested including

solar, vibrational, biochemical, and light. A successful

demonstration of the solar energy. The SOLAR-aware

LEACH aims at extending the lifetime of the sensor

network by choosing solar-aware nodes as the preferable

cluster heads. While the harvesting energy provides the

ability to extract energy from the environment, it must

be efficiently integrated into an embedded system to

translate that harvested energy into increased application

performance and the system lifetime. This shows that

harvesting itself is very complex. The other drawback

being that the solar energy harvesting requires outdoor

system deployment, thus does not work for the indoor

networks.

Lindsay and Raghavan [19] proposed Power Efficient

Gathering in Sensor Information Systems (PEGASIS)

which achieved about 100-300% improvement over

LEACH over a range of percentages of nodes dying out

in different network sizes. In PEGASIS sensor nodes

form a chain to transmit and receive the data. Each node

transmits or receives data from a neighbor and only one

node from the chain is selected to send the data to the

base station. Each node on receiving the data aggregates

it to its own data and then transmits further. The

aggregated data is eventually sent to the base station.

The chain construction is done in a greedy way. Fig 2.3

illustrates that node-0 transmits data to node-1. Node-1

aggregates it to its own data and transmits it to the node-

2. Similarly, node-4 transmits its data to node-3. Node-3

aggregates it to its own data and transmits it to the node-

2. The node to finally aggregates all the received data

along with its own and relays it to the base station.

Fig-2.3: PEGASIS

Unlike LEACH, PEGASIS uses multihop routing and

only one node sends the data to the base station.

Although, PEGASIS shows 100--300% improvement

over LEACH for different network and topologies, there

are many issues which cannot be neglected when

analyzing a protocol. There is only one packet which is

reported to the base station every second, no matter how

large a network may be. The nodes are supposed to be

power adjustable do that if they are eventually selected to

the send the final packet to the base station, then many

must be able to do it in one hop. This again brings to us

the constraint of maximum power which a node can

possess [22]. Given that the maximum outdoor range is

100m, restricts the area which can be covered by

PEGASIS. As PEGASIS reduces the redundancy to zero

in the network, there is expected to be some scheme to

ensure reliability which is again absent.

Threshold sensitive Energy Efficient sensor Network

(TEEN) proposed by Manjeshwar and Agrawal is

actually the modified version of LEACH [14]. The

modification proposed was to convey two attributes to

the nodes from the cluster heads, namely, (i) Hard

Threshold and (ii) Soft Threshold. Hard threshold was

the absolute value of the sensed parameter beyond which

the value must be transmitted to the cluster head. Soft

threshold was the value of the sensed parameter beyond

which the node must activate its transmitter. As the data

was expected to be transmitted less frequently than being

sensed, so the protocol is much more energy efficient

then LEACH. But there are drawbacks which cannot be

neglected. If the threshold is not reached then data is not

communicated to the base station[23] [24]. There were

no messages to inform the base station that whether the

node has gone dead or the data is not crucial enough to

be reported. Thus, the reliability of data reportage

becomes an important drawback. Adaptive Periodic

Threshold sensitive Energy Efficient sensor Network

APTEEN was designed to remove the drawbacks of

TEEN. APTEEN adds an extra attribute to the packet

sent by the cluster heads to the cluster members.

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 2, February 2013)

400

It not only includes the thresholds but also includes the

maximum interval between two packets. This

modification makes the protocol usable even by time

driven networks.

III. PROPOSED SYSTEMS

Wireless Sensor Networks (WSNs) like mobile

adhoc Networks (MANETs), are self-configuring

networks. But unlike MANETs, they are statically

deployed and each WSN has a central authority, known

as base station. Each sensor performs the sensing task

independent of others, but the routing of the sensed data

to the base station needs communication among the

nodes. Sensor nodes do not communicate except for

forwarding data to the base station or helping in

disseminating data from the base station. Therefore,

when determining the routes in a WSN, single

destination shortest paths is needed. Sensing requires

very little energy as compared to communication

Typically, the major physical layer property which is

assumed to be fixed in design of a routing protocol for

WSNs is the node transmission power. The network with

nodes having uniformly fixed transmission power are

referred to a symmetric networks. The traditional

protocol stack independently models the physical layer

and the higher layers. The abstraction of one layer is

added to the other layer to provide power of multi-

layering. Power control is very important in designing of

any protocol for wireless sensor networks as the nodes

are battery dependent. To control the energy

consumption at the nodes, the transmission range could

be varied. But, the variation should be done considering

the fact that the nodes have at least one path to the base

station and at the same time do not increase their

respective transmission ranges so as to give rise to a

densely connected graph. The configuration of the

physical layer properties at the startup time needs

hardware instructions. The transmission range is

adjusted thereby to get the best results at the network

layer.

When working with asymmetric networks the

physical layer properties come into picture very often, as

transmission range is required to be adjusted from time

to time. The current chapter of this thesis deals with a

proposal for a new routing protocol based on the above

principle of cross layer optimization. Extensive

simulations were carried out to compare the proposed

protocol with some existing protocols. The simulated

protocols include SPIN, LEACH and the two versions of

symmetric protocols. The symmetric protocol versions

are based on DSDV, so minimum hop count has been

used as routing metric.

3.1 Energy-aware Protocols

The research on energy-aware protocols for WSN has

so far focused on two major strategies to optimize energy

usage, viz., (i) reducing transmission of redundant data,

and (ii) confining communication to local sub-regions

(clusters) by partitioning areas of sensing environment.

Two well known protocols, namely SPIN and LEACH

which we chose to simulate are the representative cases

of the above two strategies. We also simulated two

versions of symmetric protocols. The characteristics of

symmetric protocol versions are as follows:

The basic protocol is a modification over

Destination Sequenced Distance Vector

(DSDV) protocol for adhoc networks. The

routing metric used is minimum hop count. The

routing in the first version does not have any

energy optimization criterion.

The second version attempts to make the first

version energy efficient by introducing residual

energy consideration.

The newly proposed asymmetric routing protocol has

been simulated with the purpose of comparing it with

the existing work. We looked at the following three

versions of the proposed protocol.

The first version is just a simple (no energy

consideration) routing protocol that works. for

asymmetric network. It uses minimum hop count

as the routing metric

The second version proposes to make the above

protocol energy efficient by introducing the

consideration of residual energy while relaying

the data.

The third version is adds an aggregation protocol

to combine residual energy consideration with

the idea of confining communication among

nodes locally.

3.2 Routing Protocols for Symmetric Networks

Since, WSNs are resource constraint, the most

important thing to be kept in view when designing a

routing protocol for WSN is that it should be (i) resource

aware, and (ii) should not be too complex to implement.

The symmetric routing protocol has been designed with

these two constraints in mind. The underlying idea is to

avoid flooding or injecting redundant data packets while

the data is being transmitted, a route discovery is

initiated or a route maintenance event occurs.

3.2.1 Multichip Minimum Hop count Protocol

Our first attempt is to find the shortest path between the

nodes and the base station and to be able to maintain it

in a distributed way. We have employed

acknowledgements for the data packets to ensure data

transmission reliable.

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 2, February 2013)

401

Route Discovery

Normally, route discovery in symmetric networks is

performed in top-down fashion. The base station

initiates a route discovery process by sending a broadcast

message to all the neighbor nodes. Each node caches a

routing table which contains the preferred neighbor and

the hop count of the path. Fig 3.1 illustrates the fields of

routing table.

Fig-3.1.Routing Table

The receiving node updates its routing table and

rebroadcasts the request packet including its own details

downstream towards destination. The updates are

performed only if the hops reported by the route

information packets are less than the hop count of the

path cached. The route discovery process is a one time

task which is performed at the network startup.

Route Maintenance

Symmetric networks use periodic Hello packets to

maintain network topology. A Hello packet tells a node

about the status its neighbors. These packets contain

routing table information of the neighbors. When

relaying any data packet along the preferred neighbor,

the node checks whether it has received Hello message

from that neighbor or not. If no hello packet is received

from that neighbor for a long time then that neighbor is

considered to be dead or out

of service for the time being. If the frequency of these

packets is low then it takes long time to determine a

non-functioning route. Consequently, all the packets

routed through existing routes may either be dropped or

have to be retransmitted. Therefore, it necessitates

frequency of Hello packets sending to be substantial in

the case of time-driven networks.

Reliability

The wireless medium is not a reliable medium, as it

experiences interferences and noises from various

sources. The reliability has to achieve by designing a

robust protocol. Thus, our design is an

acknowledgement based protocol. The acknowledgement

is sent by base station on receiving a data packet. The

sender nodes caches the send packet till it receives an

acknowledgement. A data packet may be retransmitted

three times in the case of subsequent failures.

If failure occurs even after the three successive

retransmission, then the packet is discarded and the

cached neighbor is invalidated. The node is then left

with no valid path to relay the data packets. But as it

keeps on receiving the periodic Hello packets from its

neighbors, it may cache the sender of the next Hello

packet as the preferred neighbor. Later, it can update its

cache if any other Hello packet offers a better path in

terms of the hop count.

Evaluation of the Protocol

Although the above routing protocol perform better

than the traditional protocols like flooding gossiping,

SPIN, still there are certain problems. In the routing tree

the nodes near the base station are loaded with the

responsibility of relaying the data packets of the far-off

nodes well. Therefore, the nodes near the base station

exhaust their energy much before the far-off nodes. With

this, even if the far-off nodes have sufficient energy to

sense, they are unable to send data to the base station

because of the absence of a valid routing path. As the

links are required to be symmetric, all nodes need to

maintain same transmission power. Each node i select

the respective minimum level li at which they have at

least one path to the base station. The transmission

range is the maximum of the power level selected by

each node. So, a node has to maintain higher power

level even when it can possibly work well with lower

power. As already explained above, the Hello packets are

required to be more frequent than the data packets in

case of time-driven networks.

3.3 Routing Protocols for Asymmetric Networks

This work, as already stated, aims at proposing a

multihop energy efficient, reliable routing protocol for

wireless sensor networks. The idea is to retain the

positive characteristics of the existing protocols and

overcome the drawbacks. The protocol also targets to be

fault tolerant as well as scalable.

3.3.1 Energy Efficiency and Reliability

Our first target is to eliminate the bottleneck around

base station by sharing the responsibilities of data

transmission equitably among the near as well as far-off

nodes. It involves adjustment of per node transmission

power. The periodic variation in the transmission power

changes the network topology, and gives rise to

existence of asymmetric links in the network. It

maintains multiple optimal paths for communication, so

that an alternate path is available if one being used fails.

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 2, February 2013)

402

Maintaining Discrete Levels

Our protocol maintains discrete levels of the

transmission range. The transmission ranges changes in

steps. Fig 3.3 depicts the changes in network topology

when the transmission range of the nodes changes in

step of 5. It may be observed that by adjusting node

transmission power, the number of nodes at one hop

distance from the base station changes.

Initially, as Fig 3.3 (a) shows, the transmission

range is 10m and the there are 2 nodes namely,

node-2 and node-3 at distance one hop to the

base station. So, the data transmission loads

from all the nodes get distributed among these

two nodes.

Fig 3.3 (b) depicts the change in topology when

the transmission range is 15m. There are four

nodes, viz., node-2, node-3, node-4 and node-5

at one hop distance to the base station. With

this new configuration, the load of data

transmission can now be distributed among four

nodes, implying lesser loads on node-2 and

node-3.

Fig 3.3 (c) gives the topology when the

transmission range is raised 20m. Now five

nodes, viz., node-2, node-3, node-4, node-5,

node-6 are at one hop distance from the base

station. As a result, the load of data

transmission can be distributed among five

nodes.

Fig-3.3. Topology variation: a) Transmission Range=10m

b) Transmission Range=15m c)

Transmission Range=20m

Thus, by regulating between the three transmissions

ranges periodically, we can avoid the bottleneck around

the base station. The lowest level transmission range of

different nodes may be different. It depends on the

position of a node in the network, so that the node

remains connected with the rest of the network, where

connectivity means existence of a route to the base

station. At a particular time instant two nodes can be at

different levels of transmission range.

The maximum level of transmission range is fixed based

on two conditions:

It should be large enough so that no node should

be left disconnected with this transmission range

when considering a symmetric network.

It should not be very large so as to make the

graph very densely connected and lead to wastage

of energy

resources.

The transmission range of the node increases in

levels. But there is no point in increasing the

transmission range of a node further once it has reached

the level when it is at one hop distance away from the

base station. This way the maximum transmission range

level attained by different node is different.

Transmission Range Period

The period for which a particular level should be

maintained is same for all nodes. This period is decided

based on number of nodes in the network, the

application and the area to be covered. The reason is:

sufficient time should be allowed for the newly formed

topology to converge. The time required to converge the

topology depends on the RTT (round trip time), since

the route discovery takes time proportional to RTT

(when done in bottom up fashion). The round trip time

is different for different nodes. It depends on the number

of hops (counted on the basis of initial transmission

range) between the node and the base station. As the

number of hops increases the round trip time increases.

The period of change of transmission range is required

to be large enough to allow the topology convergence.

Suppose the time taken to cover one hop distance is x

seconds. For N nodes the worst topology possible is

linear topology and so in worst case the hop count of a

node to reach the destination (base station) is N. In this

scenario the round trip time to discover the route is 2N x

seconds. Therefore, to provide enough time to a topology

to converge and use the discovered path, the

transmission range period should be greater than 2N x

seconds.

Route Discovery

The periodic changes in transmission ranges of

nodes create asymmetric networks. The process of route

discovery in such networks is different from that in

symmetric networks. In an asymmetric network a path

which may be valid from the base station to a node may

not be valid when reversed. The reason is some node-A

on the one way may be in range of other node-B, but

node-B might not be in the range of node-A. Fig 3.4

illustrates an example where there is a valid path 1-2-5-

9 from base station to node-9, but this path is not valid

in the reverse direction.

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 2, February 2013)

403

Fig-3.4. Asymmetric Network

In other words, node-9 can not reach 1 via the reverse

path 9-5-2-1. The data packets from node-9 can be

transmitted along the path 9-4-2-1. Such a path can be

discovered only by bottom-up approach and not in top-

down manner. The node which needs to discover the

route initiates a route request which is broadcast to all

the neighbor nodes. A node receiving the route request

packet checks for the staleness of the packet and on

finding it fresh rebroadcasts it further, till the request

reaches the base station. Assuming that the base station

is a powerful node (connected to stable power supply) so

it can reach all the nodes through one hop. The base

station sends back the reply which includes the preferred

neighbor of the requesting node. The base station avoids

sending the complete path by different nodes is different.

to the requesting node. It has three advantages:

The sending complete path would unnecessarily

increase the size of the reply packet.If the

number of nodes is N, assuming the worst case

topology (linear topology) the maximum number

of hop-counts to reach the destination (base

Station) can be as large as N. So, the size of the

reply packet may increase by a factor of N.

The requesting node caches only the preferred

neighbors id. If the complete path was to be

cached then memory (an important resource)

would be wasted for no fruitful reasons. _ If

complete path were cached then the nodes

caching the three paths to the base station has an

option of using one out of three alternate paths

available to a node. On the other hand, by

caching preferred neighbors, potentially more

alternate paths can be stored.

In Fig 3.5, the numbers in curly braces are the

cached ids of the preferred neighbors, and

arrows represent the connectivity. Consider for

example node-11, if the complete paths were

cached then the number of alternate paths

available is 3, i.e., {11-5-2-1, 11-6-3-1, 11-7-3-

1}. Whereas, if only the neighbors are cached

then the available number of alternates increase

to 5, namely, {11-5-2-1, 11-5-3-1, 11-6-2-1, 11-

6-3-1, 11-7-3-1}. Actually, if all the three

neighbors lead to three valid paths each, then the

potential number of number of alternate paths

could be as many as 3k, where k is the number of

hops from node to the base station.

To avoid the same request packet from being

rebroadcast by the same node, route request packet are

numbered. This sequence number is of the form <

node_id, request_no >. If node receives a request packet

with a repeated sequence number then that packet is

discarded. Thishelps in avoiding the loop formation in

the paths also removes unnecessary congestion in the

network.

Fig-3.5. Wireless Sensor Network

Acknowledgement Based Protocol

The protocol retains the reliable nature of symmetric

protocols by inheriting their acknowledgement

characteristic. The base station sends the

acknowledgements for the received data packets. Like

the previous case, there can be at most three

retransmissions in the case of delivery failures. If the

failure occurs for the fourth time, then the cached

neighbor is declared as invalid. After invalidating the

neighbor, if no cached neighbor is available, then

reactive route discovery takes place.

Route Maintenance

In asymmetric networks hello packets can serve no

purpose. Suppose node-A and node-B share an

asymmetric link. Even it a node A has direct access to

another node B, B may not have direct access A.

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 2, February 2013)

404

A could cache B as its neighbor for routing the data

packets to the destination. Since the hello packets from

B can not reach A, the use of these packets does not

work for maintaining routes in asymmetric networks.

Consequently, discovered routes in asymmetric network

are maintained in reactive manner. The initial route

discovery is done in a proactive way at the start of each

transmission period. Our design combines the

advantages of both proactive and reactive protocols. A

proactive protocol has low latency but discovers and

rediscovers routes which are not required, whereas are

active protocol discovers only the required routes but has

higher latency. In the proposed approach, the proactive

discovery of the routes is done when the node changes

its transmission range (change in transmission range is

periodic). The maintenance of routes is done in reactive

way. In case the acknowledgement is not received for

any data packet even after three retransmissions, the

path invalidated and a reactive route discovery takes

place.

3.3.2 Energy-Aware Routing

The second version of our proposed protocol is

designed to uncover the importance of residual node

energy in data transmission. It provides an integrated

approach to cache the residual energy of the preferred

neighbors and choose the best alternate available for

relaying the data packets.

Residual Energy Consideration

In the protocol for symmetric networks, the energy

updates were provided by the Hello packets. However, in

the light of the discussions in section 3.3.1, Hello

packets cannot help. Therefore, each node sends a

periodic energy update to the neighbors informing the

maximum level of the transmission power with which it

can operate. If the sender of the Energy Update packet is

cached as the preferred neighbor at the receiver, the

recipient also stores the updated residual energy value.

Since, energy update packets have no other purpose like

route maintenance, they can be sent less frequent than

route update packets (Hello packets) in symmetric

networks.

3.3.3 Role of Aggregation Protocol

We also integrated an aggregation protocol for data

transmission in the proposed energy aware routing

protocol the asymmetric network. There are many

applications where the precise location of data is not

important. In other words, the spatiality of data can be

extended to include data from any point within a sub-

region. So, it we may aggregate data from the cluster

members by either finding the mean, median, or mode,

then transmit a single value to base station. It helps to

eliminate spatial redundancy in the sensor data. An

example application can be temperature monitoring in

an area.

Cluster Formation

Typically, the cluster formation all the clustering

protocols is performed by the base station .ut our design

this unwanted overhead on the base station has been

eliminated by the distributed formation of the clusters.

Fig 3.6 shows

.

Figure 3.6: Aggregation in Asymmetric Network

explains the clustering process. The nodes sharing the

same preferred neighbor for a particular round forms a

cluster. For example, as node-2, 3, and 4 all have node-1

as their preferred neighbor, so these nodes belong to the

same cluster. Similarly, node-5, and 6 cache node-2 as

their preferred neighbor implying that {5, 6} form a

cluster. In all seven cluster can be identified in Fig 3.6.

These are: {(2,3,4), (5,6), (7,8), (9,10), (11,12), (13,14)}

3.4 Evaluation of the Proposed Protocol

Before carrying out empirical evaluation of the

proposed protocol through simulation, it is instructive to

identify the basic parameters on which an evaluation

should be based, and to qualitatively argue out the

reasons behind expecting improvements compared to

existing routing protocols for WSNs. In this section we

discuss about these parameters.

3.4.1 Improved Lifetime

The proposed protocol eliminates bottleneck around

the base station by periodic change of topology through

per node power adjustment. The protocol is resource-

aware as the preferred path is selected on the basis of the

maximum residual energy.

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 2, February 2013)

405

Therefore, the proposed protocol when compared

with the existing protocols should results in better

network lifetime.

3.4.2 Resource-awareness

The design is resource-aware as is chooses the path

with maximum residual energy from among the existing

alternatives, for relaying the data packets to the base

station.

3.4.3 Reduced Message Complexity and Zero

Redundancy

There exists no redundancy in transmission of the

data packets. The redundancy in the route request

packets has been avoided by using the request ids in the

respective packets. Every node caches at most three

neighbors to be used as the preferred next hops for

relaying the data. Once three neighbors have been

discovered, further discovery is considered redundant.

The base station uses a REQ_CAN packet, which

contains the id of the requesting node and the sequence

number of the request. It is broadcast by the base station

once three neighbors for any node are discovered. Any

node on receiving this packet discards the route request

quoted by the REQ_CAN packet. Thus, this packet is

used as a death certificate for the route request packets

from a particular node and a specific sequence number.

3.4.4 Reliability

As the redundancy is reduced to the minimum level,

the overhead due to reliability is required to be

considered. There are acknowledgements for the data

packets. The protocol design supports at max three

retransmissions of a data packet. There is trade-off

concerning reliability versus redundancy. But reliability

in a way helps to eliminate requirement for redundancy.

3.4.5 Scalability

The protocol puts no constraint of the deployment

area. New nodes can be injected to the network. A new

node performs a reactive route discovery for a path to the

base station. It can be used as a forwarding node only

after the next proactive discovery takes place, or if there

is any reactive discovery before the next proactive

schedule.

3.4.6 Fault Tolerance

The protocol is dynamic enough to handle the node

failures. If a node fails, the packets relayed along that

path will result in no acknowledgements, so the paths

will be invalidated after three retransmissions.

If on invalidating the path, a node is left with no valid

path, it reactively starts

a new route discovery.

3.4.7 Load Balancing

Each node maintains three alternate preferred

neighbors to be used for relaying the data to the base

station. As the best is chosen based on the maximum

residual energy, the load is balanced among the three

neighbors.

3.4.8 Requirements for Specialized Support Parameters

Some routing protocols like LAR [15] or GAF [29]

make use of position vectors of the nodes to eliminate

flooding during route discovery. However, our proposed

protocol does not require any such additional support.

The protocol works independent of the location of the

individual nodes. Therefore, suited both for indoor and

outdoor networks. The routing algorithm is simple to

implement.

IV. SIMULATION RESULTS

In this chapter we present the results of

experiments carried out for evaluating the performance

of the proposed energy efficient routing protocol. For a

evaluation to be meaningful, the performance of the

proposed protocol should be compared with the

performances of certain well known existing energy

aware protocols. We base our evaluation primarily by

comparing with the performance of two other protocols,

namely, SPIN [11] and LEACH [12]. The choice of

these two protocols for performance comparison is

guided by two important reasons. SPIN’s approach is

based on eliminating data redundancies due to impolsion

and overlaps exhibited by plain flooding. On the other

hand, LEACH’s approach is to form random clusters in

each round so that the load of data transmission borne by

the cluster heads can be spread uniformly over all nodes.

So, LEACH cuts back overheads due communication by

localizing most of the communication through data

aggregation.

Since, the proposed protocol leverages cross layer

optimization for energy efficiency in WSN routing, it

should independently show performance enhancement

over symmetric routing protocols and over both SPIN

and LEACH even without data aggregation. The results

are discussed through plots accompanied by explanation

as needed.The simulation environment consists of 80

nodes uniformly randomly distributed over a space of of

(125X190)m2 Certain experiments have also been done

to see the effect of change in the network density over

the lifetime.

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 2, February 2013)

406

The node attributes chosen to strongly resemble

MICAz motes. A MICAz mote is a 2.4 GHz, IEEE

802.15.4 complaint chip. The mote module used for

enabling low power wireless interface. Since the indoor

range of for the sensor networks is 20m � 30m, the

transmission range variations are applied within this

range. As specified in the IEEE 802.15.4, we have used

the standard data packet size of 128b y tes. The

simulation assumes the base station to be fixed at the

origin and is a powerful node.

4.1 Node Placement

The plot in Fig. 4.1 shows the distribution of the

nodes. The base station or the control center is placed at

the origin, i.e., (0,0). The position of the other nodes are

randomly generated by the simulating software.

Fig- 4.1. Node Placement

The distribution followed is the random uniform

distribution. A black dot displays the position of a node,

the id of the node is written alongside the dot. The base

station id is 1, and the 80 sensor nodes are allocated ids

from 2 to 81.

4.2 Network Lifetime

As, already mentioned, one of the major objective of

this work has been to improve the lifetime of the sensor

networks. So we compare the lifetime in the proposed

methodology with the existing protocols. Typically, there

are three different measures for the lifetime of a WSN,

namely,

1. The time till the first node exhaust its energy,

2. The time till the last node exhaust its energy, and

3. The time till half the nodes in the network exhaust

their energy.

In this work, The first parameter has been used for the

purpose of comparison of different protocols.

Fig-4.2. Lifetime

The plot in Fig. 4.2 shows the improvement in the

lifetime obtained with the proposed methodology over

the existing symmetric protocol semantics. The five

protocols compared in this section are

SPIN: The transmission range of the nodes is

taken to be 29m, as this is the minimum range

when all nodes get at least one path to the base

station.

Symmetric Protocol: The transmission range used

is same as above.

Symmetric protocol with Residual Energy

Consideration: The transmission ranged used is

same as above.

Asymmetric Network: In this all nodes change their

transmission range between a fixed range in steps.

Parameter values:

1. Transmission Range: 20m�32m

2. Transmission Period: 12Nsec

3. Step Size: 3m

4.Asymmetric protocol with Residual Energy

Consideration: All the parameters are kept unchanged as

above. The Energy update packets are broadcast to the

neighbors every 5 secs.

4.3 Effect of Node Failure

The plots in this subsection are used to observe the

effect of node failure on the lifetime of the network when

the nodes near the base station fail.

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 2, February 2013)

407

The network configuration used for the purpose of

evaluation is as follows:

1. The period of the transmission range: 12Nsec.

2. The range between which transmission power is

varied: 20m to 32m.

3. The steps in which transmission range is varied:

6m.

4. The variation in percentage of node failures: 1%-

5%.

Fig-4.3. Effect of node failure on Lifetime

There is a trade-off between the following:

1. The total energy drained out of the network because of

the packets generated by centrally located nodes,

2. The total energy saved by the far-off nodes when they

use those centrally located for routing data packets.

The plot in Fig. 4.3 shows the effect on the lifetime of

the network when nodes far-off from the base station

fail. If the far-off nodes die then the lifetime shows an

improvement of about 7% with 5% nodes going dead. It

happens because the load due to the route discovery and

the data packet of the far-off nodes reduces. The nodes

near the base station are now less loaded and last longer.

4.4 Effect of Aggregation

The aggregation version of the proposed protocol has

been compared with the well known aggregation

protocol LEACH [12]. The lifetime obtained with

proposed approach was 150400sec which shows an

improvement of more than 400% is observed over

LEACH (27099sec). As already stated in chapter 2,

LEACH is not suited for such large area.

But still if we remove the constraint of the

transmission range and assume to use nodes with very

high transmission ranges, that is maximum of

approximately 250m, the proposed protocol outperforms

LEACH.

4.4.1 Clusters in LEACH

Although as mentioned in the chapter 2, LEACH can

work in this configuration with the assumption that the

nodes are able to increase their transmission range to

around 250m, the number of clusters to be formed are

taken to be 20% of the number of nodes. If the number is

higher then the performance goes down further. Since,

the total number of nodes is 80, the highest number of

clusters formed at any particular instant of the

simulation was 16. The total area covered by each

cluster is approximately 1500m2, which is large enough.

Fig-4.4. a) Clusters in LEACH

4.4.2 Effects of Aggregation in Proposed Protocol

The graph in Fig. 4.4. b) shows that by introducing

aggregation in the proposed asymmetric protocol,

around 40 clusters are formed at any particular instant of

the simulation. Therefore, the number of packets

delivered is much more than in the case LEACH as

depicted in Fig. 4.4. a). The total area covered by each

cluster in case of the asymmetric network is

approximately 600m2 which leads to better localization

of communication We addressed the following issues

through our experiments.

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 2, February 2013)

408

Energy efficiency: The lifetime of the network

increased by about 155% in comparison to the

symmetric network.

Scalability: The protocol is dynamic enough to handle

the failures and new insertions.

Low latency: As the protocol is a mixture of both

proactive and reactive protocols, the total delay factor is

3RT T + k, where k is a parameter introduced due to

congestion Reliability: It is an acknowledgment based

protocol. If acknowledgment is not received for a packet

till acknowledgment timeout, retransmissions take place.

Easy to implement: The implementation details

presented, clearly shows that the protocol is easy to

implement.

Fig-4.4.b) Clusters in Asymmetric Network with

Residual Energy Consideration

V. CONCLUSION

The work in this thesis is focused towards designing,

implementation and evaluation of energy efficient

routing protocols for wireless sensor networks. The

elimination of bottleneck around the base station is a

matter of major concern. The effort was directed towards

uniform distribution of data transmission and

dissemination load among the nodes across the network.

We realized that only way to achieve this is to develop a

methodology for distributed topology control. We

studied the specification of MICAz motes and came to

conclusion that by per-node transmission power

adjustment, it is possible to control topology and thus

eliminate the bottleneck around the base station.

It resulted in increase in the lifetime of the network.

Through a series of simulation experiments using

different network configurations, we observed that the

approach is justified and result in substantial

performance enhancements over existing energy aware

protocols. The proposed protocol when compared to the

symmetric multihop protocol was found to attain 155%

improvement in the lifetime. The aggregation version of

the proposed protocol showed an improvement of 400%

over the existing aggregation protocol LEACH.

REFERENCES

[1]. C. Schurgers and M. B. Srivastava, “Energy efficient

outing in wireless sensor networks,” in Proc. IEEE

Military Communications Conf. (MILCOM), 2001, pp.

357–361.

[2] D. Ganesan, R. Govindan, S. Shenker, and D. Estrin,

“Highly-resilient, energy-efficient multipath routing in

wireless sensor networks,” SIGMOBILE Mobile Comput.

Commun. Rev., vol. 5, no. 4, pp. 11–25, 2001.

[3] R. Shah and J. Rabaey, “Energy aware routing for low

energy ad hoc sensor networks,” in Proc. IEEE Wireless

Communications and Networking Conf. (WCNC), 2002,

pp. 350–355.

[4] J.-H. Chang and L. Tassiulas, “Maximum lifetime routing

in wireless sensor networks,” IEEE/ACMTrans. Netw., vol.

12, no. 4, pp. 609–619, Aug. 2004.

[5] G. Park, S. Yi, J. Heo, W. C. Choi, G. Jeon, Y. Cho, and C.

Shim, “Energy aware routing with dynamic probability

scaling,” in Lecture Notes in Computer Science. New

York: Springer, 2005, vol. 3642, pp. 662–670.

[6] C. Lu, B. Blum, T. Abdelzaher, J. Stankovic, and T. He,

“RAP: A real-time communication architecture for large-

scale wireless sensor networks,” in Proc. IEEE Real-Time

and Embedded Technology and Applications Symp.

(RTAS), 2002, pp. 55–66.

[7]. Wendi Heinzelman, Anantha Chandrakasan, and Hari

Balakrishnan. Energy-efficient communication protocols

for wireless microsensor networks. In Proceedings of the

33rd Annual Hawaii International Conference on System

Sciences, 2000, pages 10 pp. vol.2–, Jan 4-7, 2000.

[8] B. Hull, K. Jamieson, and H. Routing protocols overview

and design issues for selforganized networks. In

International Conference on Communication Technology

(WCCICCT), volume 2, pages 1298–1303, 2000.

[9] Chalermek Intanagonwiwat, Ramesh Govindan, and

Deborah Estrin. Directed diffusion: a scalable and robust

communication paradigm for sensor networks. In

MobiCom ’00: Proceedings of the 6th annual international

conference on Mobile computing and networking, pages

56–67, New York, NY, USA, 2000. ACM Press.

[10] Young-Bae Ko and Nitin H. Vaidya. Location-aided

routing (LAR) in mobile ad hoc networks. volume 6, pages

307–321, 2000.

[11] Philip Levis, Nelson Lee, Matt Welsh, and David Culler.

Tossim: accurate and scalable simulation of entire tinyos

applications. In SenSys ’03: Proceedings of the 1st

international conference on Embedded networked sensor

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 2, February 2013)

409

systems, pages 126–137, New York, NY, USA, 2003.

ACM.

[12] F. L. Lewis. Wireless sensor networks. In D. J. Cook and

S. K. Das, editors, Smart Environments: Technologies,

Protocols and Applications, pages 12–13. John Wiley,

New York, USA, 2004.

[13] X. Lin, N. B. Shroff, and R. Srikant. A tutorial on cross-

layer optimization in wireless networks. IEEE Journal

onSelected Areas in Communications, 24(8):1452–1463,

2006.

[14] Stephanie Lindsey and Cauligi S. Raghavendra. Pegasis:

Power-efficient gathering in sensor information systems,

2002.

[15] Arati Manjeshwar and Dharma P. Agrawal. Teen: A

routing protocol for enhanced efficiency in wireless sensor

networks. 15th International Parallel and Distributed

Processing Symposium (IPDPS’01), 03, 2001.

[16] Wendi Heinzelman, Anantha Chandrakasan, and Hari

Balakrishnan. Energy-efficient communication protocols

for wireless microsensor networks. In Proceedings of the

33rd Annual Hawaii International Conference on System

Sciences, 2000, pages 10 pp. vol.2–, Jan 4-7, 2000.

[17] Arati Manjeshwar and Dharma P. Agrawal. Apteen: A

hybrid protocol for efficient routing and comprehensive

information retrieval in wireless sensor networks. In

IPDPS ’02: Proceedings of the 16th International Parallel

and Distributed Processing Symposium, page 48, 2002.

[18] J. Neander, E. Hansen, M. Nolin, and M. Björkman.

Asymmetric multihop communication in large sensor

networks. In Wireless Pervasive Computing, 2006 1st

International Symposium on, pages 7 pp.–, 16-18 Jan.

2006.

[19] J. Neha, D. K. Madathil, and D. P. Agrawal. Exploiting

multi-path routing to achieve service differentiation in

sensor networks. In 11th IEEE International Conference

on Networks (ICON), pages 681–686, October, 2003.

[20] Kumar Padmanabh and Rajarshi Roy. Bottleneck around

base station in wireless sensor network and its solution. In

Mobile and Ubiquitous Systems - Workshops, 2006. 3rd

Annual International Conference on, pages 1–5, 17-21

July 2006.

[21] Charles Perkins and Pravin Bhagwat. Highly dynamic

destination-sequenced distancevector routing (DSDV) for

mobile computers. In ACM SIGCOMM’94 Conference on

Communications Architectures, Protocols and

Applications, pages 234–244, 1994.

[22] Sharmila Ravula, Ji Eun Kim, Brad Petrus, and Christoph

Stoermer. Quality attributes in wireless sensor networks.

Third IEEE Workshop on Software Technologies for

Future Embedded and Ubiquitous Systems (SEUS’05),

00:30–32, 2005.

[23] Rahul C. Shah and Jan Rabaey. Energy aware routing for

low energy ad hoc sensor networks. In Wireless

Communications and Networking Conference, 2002.

WCNC2002. 2002 IEEE, volume 1, pages 350–355, 17-21

Mar 2002.

[25] Ya Xu, John Heidemann, and Deborah Estrin. Geography-

informed energy conservation for ad hoc routing. In

MobiCom ’01: Proceedings of the 7th annual international

conference on Mobile computing and networking, pages

70–84, New York, NY, USA, 2001.

[26]. ACM. Documentation and tutorials for omnet++.

http://www.omnetpp.org/.

[27]Micaz 2.4 ghz data sheet.

http://www.davidson.com.au/products/wireless/

crossbow/mica-2-4.asp. [26]The network simulator ns-2.

http://www.isi.edu/nsnam/ns.

AUTHORS PROFILE

K.Vinoth Kumar received the B.E. degree in electronics and communication engineering from the Kurinji College of engineering and technology, Manapparai, Anna University, Chennai, India, in 2009. He received the M.E. degree in Applied electronics from the J.J College of engineering and technology, Trichirappalli, India, in

2011. Currently doing Ph.D. in communication and Networking in Karpagam University Coimbatore. His research interest includes wireless communication, Mobile Ad hoc networks, Sensor Networks, Communication networks.

S.Karthikeyan received the M.Sc

degree in Industrial electronics from

the M.I.E.T, college of arts and

science, trichirappalli India, in

2011.Currently doing M.E. in VLSI

design in Karpagam University

Coimbatore, India. His research

interest includes wireless

communication (WiFi,WiMax),

Mobile Ad hoc networks and low power VLSI

Paste

Photo

here